02.11.2014 Views

untangling_the_web

untangling_the_web

untangling_the_web

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DID: 4046925<br />

UNCLASSIFIEDlIFOR OFFICIAL blS~ QNb¥<br />

something I encourage or advocate. I do encourage you to "hack" your own <strong>web</strong>site<br />

to see what kinds of information is being revealed inadvertently via Google and o<strong>the</strong>r<br />

search engines.<br />

Also, a lot of <strong>the</strong> best information Johnny offers is for his site members only, and I do<br />

not want to suggest you register <strong>the</strong>re. None<strong>the</strong>less, Johnny's briefing slides from<br />

<strong>the</strong> 2004 Black Hat and Defcon12 conferences are available at <strong>the</strong> official Black Hat<br />

Briefings <strong>web</strong>site and elsewhere (so much for registration). I have also found his<br />

excellent white paper "The Google Hacker's Guide" at o<strong>the</strong>r sites that do not require<br />

registration; <strong>the</strong>re is ano<strong>the</strong>r very good briefing on <strong>the</strong> dangers of Google by<br />

Sebastian Wolfgarten.<br />

There was a fair amount of sniping following Long's talks at Black Hat and Defcon,<br />

mostly of <strong>the</strong> "big deal" variety, i.e., it is not "real" hacking and <strong>the</strong>refore not worthy<br />

of presenting at Defcon. However, this is a very shortsighted point of view when one<br />

considers <strong>the</strong> kinds of information that is so very easily available via Google, et al.<br />

How would you like to see your Social Security Number, credit card number, and<br />

that very handy little three digit number on <strong>the</strong> back of your credit card used for<br />

"verification," bank routing information, mo<strong>the</strong>r's maiden name, etc., in <strong>the</strong> next<br />

Google hacking briefing? Yes, all this kind of information is readily available (I<br />

know...I've uncovered quite a bit of it myself). And this doesn't even take into<br />

consideration all <strong>the</strong> o<strong>the</strong>r <strong>web</strong>site weaknesses, such as multiple vulnerabilities with<br />

liS 6.0 Web-based administration, that can be exposed using Google.<br />

Johnny Long's Googledorks Page<br />

http://johnny.ihackstuff.com/ghdb.php<br />

Johnny Long's "The Google Hacker's Guide"<br />

http://www.securitymanagement.com/library/Google Hacker0704.pdf<br />

Johnny Long, "You Got That With Google?" Black Hat Briefings and Defcon12, July<br />

2004.<br />

http://www.blackhat.com/html/bh-media-archives/bh-archives-2004.html#USA-2004<br />

Johnny Long, "Google Hacking Mini-Guide," Informit.com, 7 May 2004<br />

http://www.informit.com/articles/printerfriendly.asp?p=170880<br />

Sebastian Wolfgarten, "Watch Out Google"<br />

http://www.wolfgarten.com/downloads/Watch out google.pdf<br />

Joe Barr, "Google Hacks are for Real," Newsforge.com, 6 August 2004<br />

http://www.newsforge.com/article.pl?sid=04108105/1236234<br />

Taken all toge<strong>the</strong>r, <strong>the</strong> information Johnny Long has found using Google (he sticks<br />

with this one search engine), combined with <strong>the</strong> techniques he details at his <strong>web</strong>site,<br />

provide an excellent tutorial on using Google to find stuff that really should not be on<br />

<strong>the</strong> public Internet or easily accessible via a search query. Fur<strong>the</strong>rmore, <strong>the</strong> greatest<br />

value of his efforts may not be in finding useful information but in demonstrating <strong>the</strong><br />

vulnerabilities of any given <strong>web</strong>site and <strong>the</strong> necessity of taking strong measures to<br />

UNCLASSIFIEDIJrQR OFFl61J1cL USE ONLY 179

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!